Описание
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.
Отчет
While this flaw affects both SSH clients and servers implemented with golang.org/x/crypto/ssh, realistically the flaw will only lead to a DoS when transferring large files, greatly reducing the likelihood of exploitation.
Меры по смягчению последствий
This flaw can be mitigated when using the client only connecting to trusted servers.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Assisted Installer for Red Hat OpenShift Container Platform 2 | rhai-tech-preview/assisted-installer-reporter-rhel8 | Affected | ||
Assisted Installer for Red Hat OpenShift Container Platform 2 | rhai-tech-preview/assisted-installer-rhel8 | Affected | ||
Builds for Red Hat OpenShift | openshift-builds/openshift-builds-controller-rhel9 | Will not fix | ||
Builds for Red Hat OpenShift | openshift-builds/openshift-builds-git-cloner-rhel9 | Will not fix | ||
Builds for Red Hat OpenShift | openshift-builds/openshift-builds-image-bundler-rhel9 | Will not fix | ||
Builds for Red Hat OpenShift | openshift-builds/openshift-builds-waiters-rhel9 | Not affected | ||
Builds for Red Hat OpenShift | openshift-builds/openshift-builds-webhook-rhel9 | Will not fix | ||
cert-manager Operator for Red Hat OpenShift | cert-manager/cert-manager-operator-rhel9 | Not affected | ||
cert-manager Operator for Red Hat OpenShift | cert-manager/jetstack-cert-manager-acmesolver-rhel9 | Affected | ||
cert-manager Operator for Red Hat OpenShift | cert-manager/jetstack-cert-manager-rhel9 | Affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
SSH servers which implement file transfer protocols are vulnerable to ...
EPSS
7.5 High
CVSS3